Network support for IP traceback

被引:360
作者
Savage, S [1 ]
Wetherall, D
Karlin, A
Anderson, T
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
[2] Univ Washington, Dept Comp Sci & Engn, Seattle, WA 98195 USA
基金
美国国家科学基金会;
关键词
computer network management; computer network security; network servers; stochastic approximation; wide-area networks;
D O I
10.1109/90.929847
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back toward their source. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or "spoofed," source addresses. In this paper, we describe a general purpose traceback mechanism based on probabilistic packet marking in the network. Our approach allows a victim to identify the network path(s) traversed by attack traffic without requiring interactive operational support from Internet Service Providers (ISPs). Moreover, this traceback can be performed "post mortem"-after an attack has completed. We present an implementation of this technology that is incrementally deployable, (mostly) backward compatible, and can be efficiently implemented using conventional technology.
引用
收藏
页码:226 / 237
页数:12
相关论文
共 43 条
[1]  
[Anonymous], 1987, P ACM WORKSHOP FRONT
[2]  
[Anonymous], 2000, IETF
[3]  
[Anonymous], 1990, 1191 RFC
[4]  
[Anonymous], 2000, ICMP TRACEBACK MESSA
[5]  
Baker F, 1995, 1812 RFC
[6]  
Banga G, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE THIRD SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDI '99), P45
[7]  
Bellovin S. M., 1989, Computer Communication Review, V19, P32, DOI 10.1145/378444.378449
[8]  
Braden R., 1989, RFC 1122, DOI DOI 10.17487/RFC1122
[9]  
Burch H, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE FOURTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIV), P319
[10]  
Carter RL, 1997, IEEE INFOCOM SER, P1014, DOI 10.1109/INFCOM.1997.631117